scispace - formally typeset
Search or ask a question

Showing papers in "The Journal of information and systems in education in 2002"


Journal Article
TL;DR: This paper formulates a theory that relates cognitive requirements of different computer programming languages and programmers’ cognitive characteristics to investigate the possible effects of two human cognitive characteristics, on the difficulties of learning specific programming languages.
Abstract: This paper formulates a theory that investigates the possible effects of two human cognitive characteristics, on the difficulties of learning specific programming languages. The two human cognitive characteristics are Piaget’s cognitive development and McCarthy’s cognitive hemispheric style. This paper consolidates prior research and accepted cognitive theory. It then presents a formulation of a theory that relates cognitive requirements of different computer programming languages and programmers’ cognitive characteristics. If the cognitive requirements for a programming language are beyond the cognitive characteristics of a programming student, the student may burn out. If the cognitive requirements are below the student’s cognitive characteristics the student may be bored. If they are similar to them, the student is able to meet the challenges. Motivation, interest, self-esteem and success may thus be optimized. Different programming languages are more suited for different cognitive characteristics. This theory extends prior research in cognitive theory and cognitive requirements of computer programming.

72 citations


Journal Article
TL;DR: It is argued that ERP can be viewed as more than just another technology; rather it has the potential to bring about more effective pedagogy.
Abstract: Several colleges have joined the “SAP Education Alliance” for implementing SAP R/3 in the curriculum. Due to substantial investments in time and resources, this strategy has substantial risks. In addition, volatility and change has been the hallmark of technology, and Enterprise Resource Planning [ERP] may not be immune from such challenges. These factors notwithstanding, ERP has certain features that make it an excellent vehicle for the learning process. Specifically, ERP has the promise to address some challenges facing business education. ERP systems can provide a framework through which learning communities can be developed to inject change into the educational environment. ERP enables integration of curriculums through developing connecting points and providing a nervous system for integration, while removing redundancies between disciplines. In the process, they refine our understanding of the nature of knowledge in areas of business, while optimizing use of technology in the campus setting. This paper, therefore, argues that ERP can be viewed as more than just another technology; rather it has the potential to bring about more effective pedagogy.

58 citations


Journal Article
TL;DR: Students in the voice mail group appreciated the higher social presence of the medium, whereas students in the e-mail group appreciated receiving the text-based feedback because it could be printed and then later accessed and referenced in a non-sequential manner.
Abstract: This study compared the effects of using voice mail files sent as electronic mail (e-mail) attachments versus text-based e-mail to provide student feedback. Social Presence Theory (SPT) was used as the theoretical framework for assessing the two modes of delivering feedback. SPT would predict that voice mail would be perceived as higher than e-mail in terms of social presence. In accordance with SPT, the results indicate that voice mail was perceived to have significantly higher social presence than text-based e-mail. Both e-mail and voice mail were perceived as capable of providing a reasonably high quality of feedback. The results of this study indicate that students in the voice mail group appreciated the higher social presence of the medium, whereas students in the e-mail group appreciated receiving the text-based feedback because it could be printed and then later accessed and referenced in a non-sequential manner.

48 citations


Journal Article
TL;DR: This study identifies and classifies information technology related job listings that are disclosed in the databases of two leading e-recruiting services and identifies trends that can have important implications for students in their selection of elective courses and in choosing a track for specialization.
Abstract: The demand for information technology (IT) professionals has grown rapidly in the last decade. Parallel to this increasing need for IT personnel is the continuous change in the type of skills that are brought about by innovations in cutting edge technologies. However, the type of new IT skills and knowledge needed to keep companies competitive in the global market extend beyond the ability to apply the updated hardware and software to make business processes more efficient. Communication excellence and managerial expertise are just two of the other more commonly needed skills demanded by employers. This study identifies and classifies information technology related job listings that are disclosed in the databases of two leading e-recruiting services. Two secondary variables, written and oral communications and experience, were also collected and examined in this study. The results of this research should be of interest to job seekers, human resources administrators, career counselors, corporate trainers, information systems consultants, labor attorneys, immigration and naturalization officers, and agency recruiters. Educators will find the outcomes of this study useful for the design and development of new curricula that can prepare students for the job market. Students will find this study particularly helpful since the trends identified in this research can have important implications for them in their selection of elective courses and in choosing a track for specialization.

45 citations


Journal Article
TL;DR: Investigation of students’ perceptions of computer literacy skills they had obtained prior to enrolling in a university showed that students perceived themselves to be better prepared in word processing than they did in spreadsheet and database applications and that they had not received extensive coverage of ethical, social, legal and global issues.
Abstract: The purpose of this study was to investigate students’ perceptions of computer literacy skills they had obtained prior to enrolling in a university and to develop implications and recommendations for teaching a college-level computer course. One hundred twenty-five students who were currently enrolled in a required university computer literacy course completed a questionnaire. Students were asked to identify their skill level in various types of software and their exposure to computer concepts and issues. Results showed that students perceived themselves to be better prepared in word processing than they did in spreadsheet and database applications and that they had not received extensive coverage of ethical, social, legal and global issues. In determining the content of a university computer literacy course, consideration needs to be given to nontraditional students who have not been exposed to computers as well as those students who enter the university with a variety of skill levels. Additionally, an improved and extended coverage of database and spreadsheets might be warranted in a college level computer course. Since required computer literacy competencies are continually changing for high school graduates, it is imperative that universities monitor design and content of the curriculum to provide an adequate computer literacy background for university students.

33 citations



Journal Article
TL;DR: A case analysis of several real-world projects undertaken by students is presented, and a discussion of the “lessons-learned” from the projects are provided, which include communicating with teammates, communicating with clients, communication with the instructor, project management issues, as well as lessons learned by the instructor.
Abstract: As effective as an instructor may be, a classroom setting simply cannot offer information systems students the benefit that actually working in a real-world environment can offer. Internships can benefit a few students, but a course in which all the students are provided with the opportunity to develop systems, working with real-world clients, and where the final solution is not known until the project is completed, can also be extremely beneficial. This paper presents a case analysis of several real-world projects undertaken by students, and provides a discussion of the “lessons-learned” from the projects, which include communicating with teammates, communicating with clients, communicating with the instructor, project management issues, as well as lessons learned by the instructor.

30 citations



Journal Article
TL;DR: This study was designed to demonstrate how educators may objectively measure or assess the conflict resolution traits of students who in many cases represent prospective/emerging IS employees and reinforce previous studies which support the reliability of such assessment techniques.
Abstract: Conflict among Information Systems (IS) employees, and between IS employees and others outside their group, has the potential to add significantly to the cost of doing business for U.S. firms. While some conflict may serve the purpose of crafting a more refined product, significant or unresolved conflict can effectively serve to delay or scuttle even the most well-planned or well-designed project. Information Systems educators are in a unique position to contribute to the effective management of conflict. By using assessment/measurement techniques such as those illustrated in this study, opportunities to understand and manage conflict in the classroom and in classroom projects may be enhanced. Further, conflict assessment techniques learned and utilized by students in classroom exercises may be carried forward by those students as they begin their professional careers, thereby possibly contributing to the more effective management of conflict by IS organizations. This study was designed to demonstrate how educators may objectively measure or assess the conflict resolution traits of students who in many cases represent prospective/emerging IS employees. Some 200+ college students, the majority of whom were Information Systems majors, were assessed regarding their tendency toward collaboration, cooperation, accommodation, compromise, competition, and conflict avoidance. Results of the study reinforce previous studies which support the reliability of such assessment techniques. Other findings indicate that overall group means for the students were quite comparable to industry norms but that differences in a number of aspects related to conflict resolution styles exist between males and females, traditional and non-traditional age students, and between those with and those without work experience. Participants scored highest on the compromising construct, followed in order by the modes of avoiding, accommodating, collaborating, and competing.

29 citations


Journal Article
TL;DR: Analyzing changes in the organizational home of information systems faculty in the 1980s and 1990s found that departmental structure did not reflect the establishment of IS as a fundamental theoretical discipline, but changes in departmental location do reflect the evolution of information system in the business profession.
Abstract: Information systems (IS) faculty are located in a variety of different departments in academic institutions. Both the theoretical basis of the discipline and the curricular needs of the professional business community influence departmental organization. Analyzing changes in the organizational home of information systems faculty in the 1980s and 1990s, we found that departmental structure did not reflect the establishment of IS as a fundamental theoretical discipline. The proportion of schools organizing information systems faculty in their own separate departments was relatively unchanged in 1995 compared to 1983, while the proportion of all IS faculty in separate IS departments decreased. There was no significant decrease in the proportion of IS faculty in departments of computer science and the proportion of faculty in management science departments and related fields increased through the mid 1990s. Changes in departmental location do reflect, however, the evolution of information systems in the business profession. There were significant increases in the proportion of schools and the number of faculty included with management, marketing, operations, interdisciplinary business, and finance departments and a significant decrease in accounting departments.

26 citations


Journal Article
TL;DR: The objective of this paper is to explain transaction management in DDBS and how Oracle implements this technique, and to demonstrate the step involved in executing the two-phase commit.
Abstract: Distributed database systems (DDBS) pose different problems when accessing distributed and replicated databases. Particularly, access control and transaction management in DDBS require different mechanism to monitor data retrieval and update to databases. Current trends in multi-tier client/server networks make DDBS an appropriated solution to provide access to and control over localized databases. Oracle, as a leading Database Management System (DBMS) vendor employs the two-phase commit technique to maintain consistent state for the database. The objective of this paper is to explain transaction management in DDBS and how Oracle implements this technique. An example is given to demonstrate the step involved in executing the two-phase commit. By using this feature of Oracle, organizations will benefit from the use of DDBS to successfully manage the enterprise data resource.

Journal Article
TL;DR: Techniques for an active learning environment in a virtual MIS classroom, as well as a comparison of outcomes in that distance learning class with a regular, live, MIS class, are outlined.
Abstract: This paper outlines techniques for an active learning environment in a virtual MIS classroom, as well as a comparison of outcomes in that distance learning class with a regular, live, MIS class. These techniques included discussions, small group projects and cooperative work supported by technology such as chat sessions, e-mail and bulletin boards. Feedback to students was improved through the use of an online grade book and e-mail. Outcomes were measured in terms of grades for participation, exercises, assignments, tests and the overall grade. There were no significant differences in outcomes. The paper also presents the results of a survey measuring students' experiences with the virtual class. Students were generally very positive about the quality of the learning experience. Teaching a distance learning class using active learning techniques is a difficult and time-consuming enterprise.

Journal Article
TL;DR: In this paper, the authors examine the implications of definitions of information technology to women's participation in the industry and in academe and argue that the exclusion of multiple disciplines and women may contribute to poor technology decision-making at the societal and organizational level.
Abstract: This paper examines implications of definitions of information technology to women's participation in the industry and in academe. It is exploratory only, based on a review of selected government and industry reports and data related to IT education and the profession. However, it argues that there is evidence to suggest that discourse related to information technology has the effect of excluding women and multi-disciplinary perspectives. On the one hand, there is considerable evidence that the IT industry and skills it demands are multi-disciplinary and that many people working in the industry, particularly women, come from a variety of disciplines. On the other hand, despite the evidence of the multidimensional nature of IT, the impact of convergence, the importance of matching IT solutions to user needs and so on, a very narrow definition of IT dominates the discourse. This definition equates IT and IT professionals with computer science and engineering, disciplines which are predominately male. The result, then of this narrow definition is to marginalize women and their contributions. This is a pattern that has been observed with the development of other disciplines such as medicine. Not only does the narrowing of the definition of Information Technology tend to exclude and devalue the contribution of women but it also results in marginalization of other disciplines that would bring more "neutral" or "critical" perspectives to bear on technology. Thus the exclusion of multiple disciplines and women may contribute to poor technology decision-making at the societal and organizational level.

Journal Article
TL;DR: The exploratory findings suggest that situated learning has potential for knowledge development as well as for balancing theory and practice for delivering information systems security education.
Abstract: One of the perennial concerns in education is the ability of students to apply what they have learnt in a real world context. To tackle this issue, this paper proposes the adoption of a situated learning strategy as a mechanism for linking theory and practice for delivering information systems security education. There are two areas of focus in the research presented. First, we offer an example of an information systems security course applying situated learning strategy. Second, we examine student feedback on this particular teaching design. The exploratory findings suggest that situated learning has potential for knowledge development as well as for balancing theory and practice. Thus we recommend our example of an information systems security course for use as model of practice for other educators in this field.

Journal Article
TL;DR: This paper reports on a study that compares the problem-solving style, in terms of adaption and innovation, of Information Systems and Computer Science majors.
Abstract: This paper reports on a study that compares the problem-solving style, in terms of adaption and innovation, of Information Systems and Computer Science majors. The adaption/innovation characterization of problem-solving styles was developed by Kirton and is measured by Kirton’s Adaption-Innovation inventory. This is a well-validated instrument that measures the respondent’s preferred approach to problem-solving.

Journal Article
TL;DR: This study investigates differences between students’ perceptions of some aspects of the learning environment of open and closed computer laboratories, and also investigates differences in student outcomes from courses that adopt these two approaches to organizing computer laboratory classes.
Abstract: In Computer Science and Information Systems courses, where the computer is an integral part of the course, there are two main ways in which the practical component of the course, the computer laboratory class, may be organized. They may be closed laboratories which are scheduled and staffed in the same way as other classes, or open laboratories where the students come and go as they please. In universities in the United States, the open laboratory is more common, whereas in Australia, it is the closed laboratory that provides the practical experience for students. This study investigates differences between students’ perceptions of some aspects of the learning environment of open and closed computer laboratories, and also investigates differences in student outcomes from courses that adopt these two approaches to organizing computer laboratory classes. The use of closed laboratories requires more resources in terms of physical space and equipment and greater commitment on the part of the faculty. This study investigates whether the extra resources and commitment lead to an improvement in student outcomes. In the study, two previously developed instruments, the Computer Laboratory Environment Inventory (CLEI) and the Attitude towards Computing and Computing Courses Questionnaire (ACCC) were used. The CLEI has five scales for measuring students’ perceptions of aspects of their laboratory environment. These are Student Cohesiveness, Open-Endedness, Integration, Technology Adequacy and Laboratory Availability. The ACCC has four scales, Anxiety, Enjoyment, Usefulness of Computers and Usefulness of the Course. Of the environment variables, significant differences in the means were found for OpenEndedness, Technology Adequacy and Laboratory Availability. There was also a difference for Anxiety. There was no significant difference in achievement by students on the courses.

Journal Article
TL;DR: The research suggests that MIS faculty need to provide material to supplement the textbook coverage in order to provide adequate coverage of this serious issue of software piracy.
Abstract: This research argues that although software piracy has serious implications for the software industry and the economy, the topic receives very little detailed coverage in MIS textbooks. Software piracy has a significant impact on the software industry and on the economy as a whole. Lost sales due to software piracy amount to over $11 billion annually and lost taxes approach $1 billion annually. Current technology makes it a simple task for even a novice computer user to copy software and therefore, unauthorized software is not uncommon. The researchers conducted an evaluation of MIS texts and found that software piracy receives very little coverage in the texts. The research suggests that MIS faculty need to provide material to supplement the textbook coverage in order to provide adequate coverage of this serious issue.

Journal Article
TL;DR: This paper proposes the use of mini-cases to enhance cooperative learning and provides a procedure to write minicases based on one of the thinking processes within the Theory of Constraints.
Abstract: Teaching Introduction to Management Information Systems (MIS) courses is a formidable challenge because such teaching entails covering a relatively large, ever-changing subject, as well as finding the right balance between audiences with different expectations and levels of knowledge. The literature suggests cooperative learning as a viable strategy to teach MIS effectively. In a cooperative learning environment, students can bring their expertise to the table and work together as teams to solve business problems. One strategy to support cooperative learning in an MIS class is teaching through case studies. Since cases tend to be too long to be used during a regular class session, this paper proposes the use of mini-cases to enhance cooperative learning. The paper also provides a procedure to write minicases based on one of the thinking processes within the Theory of Constraints.

Journal Article
TL;DR: In this paper, the authors present results from a field experiment investigating the efficacy of cooperative learning on individual students in an undergraduate introduction to information systems class and conclude that cooperative learning did not have a positive effect on individual student learning.
Abstract: This study presents results from a field experiment investigating the efficacy of cooperative learning on individual students in an undergraduate introduction to information systems class. Statistical analysis of the data indicates that cooperative learning did not have a positive effect on individual student learning. This result is in contrast to effective individual learning outcomes associated with cooperative techniques reported in the education literature on cooperative learning. Furthermore, in completing a project, cooperative project groups did not have significantly higher project scores than individual students who undertook the project.

Journal Article
TL;DR: This work presents an alternative solution to relational division that is not only more intuitive and easier to deliver in the classroom but also exhibits a better computational performance.
Abstract: A common type of database query requires one to find all tuples of some table that are related to each and every one of the tuples of a second group. In general those queries can be solved using the relational algebra division operator. Relational division is very common and appears frequently in many queries. However, we have found that the phrasing of this operator in SQL seems to present an overwhelming challenge to novice and experienced database programmers. Furthermore, students seem to have the most problems with the SQL version commonly recommended in the database literature. We present an alternative solution that is not only more intuitive and easier to deliver in the classroom but also exhibits a better computational performance.

Journal Article
TL;DR: A top down curriculum design process carried out in Korea starts with the analysis of the job of an Information Security Manager, identifies the knowledge elements needed for successfully fulfilling the main responsibilities of theJob, and synthesizes them into seven courses suitable for flexible implementation.
Abstract: In this paper the authors present a curriculum design for Information Security Management, which was synthesized using the inputs from both the industry and academia. The top down curriculum design process carried out in Korea starts with the analysis of the job of an Information Security Manager (ISM), identifies the knowledge elements needed for successfully fulfilling the main responsibilities of the job and finally synthesizes them into seven courses suitable for flexible implementation. Additionally, a lateral occupational analysis of ISM reveals the value-skills (soft-skills) that should be considered in the actual implementation of the curriculum.

Journal Article
TL;DR: A fundamental task for information technology educators is to help students understand the basic ethical, social, and legal issues inherent in the discipline using in-class debates, which allow for a high level of participation, demand that students conduct significant research, and provide an interactive environment.
Abstract: A fundamental task for information technology educators is to help students understand the basic ethical, social, and legal issues inherent in the discipline. We present a method for achieving this goal using in-class debates. Debates allow for a high-level of participation, demand that students conduct significant research, and provide an interactive environment. This encourages the development of communication skills and exposes students to alternative points of view. The debates were conducted in two courses that provide a survey of some aspect of e-commerce technology, one at the undergraduate level and the other at the Masters level.

Journal Article
TL;DR: A survey of 124 students in computer applications classes was conducted to determine students’ perceptions of computer learning in the following areas: promptness, listening, computer obsession, computer anxiety, anger, frustration, enjoyment of computers, importance ofComputer knowledge, and relative importance of computer skills and people skills.
Abstract: A survey of 124 students in computer applications classes was conducted to determine students’ perceptions of computer learning in the following areas: promptness, listening, computer obsession, computer anxiety, anger, frustration, enjoyment of computers, importance of computer knowledge, and relative importance of computer skills and people skills. Results indicated that there were behavior problems involving promptness, listening, obsession, computer anxiety, anger, and frustration in the classroom. However, a majority of the students enjoyed working with computers. Additionally, they agreed that computer knowledge will be useful to them in the future; and most agreed that people skills and computer skills are equally important.

Journal Article
TL;DR: The authors first identify and rank the knowledge requirements of IS professionals using a simplified Delphi technique, then, through refined analysis, come up with two sets of 15 specific educational requirements, one each for ISMs and ISSDs.
Abstract: The IT industry in Korea, having recognized the importance of Information Security (IS), is in pressing need of IS Managers (ISMs) and IS System Developers (ISSDs). Many educational institutions, both universities and training organizations, are developing IS courses to meet this demand. For these educational programs to be successful, their design should address the specific knowledge required by IS professionals. In this paper, the authors first identify and rank the knowledge requirements of IS professionals using a simplified Delphi technique. They then, through refined analysis, come up with two sets of 15 specific educational requirements, one each for ISMs and ISSDs.


Journal Article
TL;DR: The inception, planning and first delivery of a security course as part of a postgraduate ecommerce program is described, in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate.
Abstract: This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.

Journal Article
TL;DR: The structure and content of a series of a postgraduate curriculum in Internet Security Management developed and presented jointly by the Schools of Information Systems and Computer Science at Curtin University of Technology are presented.
Abstract: This paper presents the structure and content of a series of a postgraduate curriculum in Internet Security Management developed and presented jointly by the Schools of Information Systems and Computer Science at Curtin University of Technology in Western Australia. The integration of generic skills (including problem solving, risk and project management, change management and research methods) with specialist security knowledge and practical project courses is also discussed.


Journal Article
TL;DR: While it may take considerable research and development effort to bring about infrastructures and applications that are fundamentally security-centric, there is need to cope with the prevailing information security problems.
Abstract: When the power of computing and communications technology was unleashed for the benefit of the society, only the good intentions were at heart and not enough attention was paid to the possible illegal and unethical activities in cyberspace. The intrinsic nature of Information Technology (IT) is such that, in today's world, even what is thought to be a simple criminal behavior could cause colossal damage to the society. The need to pay attention to the security issues in IT has been recognized, as evidenced by a major emphasis on security in industry and education. While it may take considerable research and development effort to bring about infrastructures and applications that are fundamentally security-centric, there is need to cope with the prevailing information security problems. Educational institutions, for their part, have responded by initiating security related research and curricula.

Journal Article
TL;DR: A teaching method that has the instructor present a concept or problem, followed by students attempting to solve the problem or define the concept themselves, and then seeking agreement with the person to their right and their left.
Abstract: A teaching method is described for use in large lecture settings as a way to help alleviate problems in content understanding, problems in concentration and lack of variety, need for multiple explanations, and lack of professorial assistance. The method has the instructor present a concept or problem, followed by students attempting to solve the problem or define the concept themselves, and then seeking agreement with the person to their right and their left. When agreement has been achieved, students each turn a name placard around so that the blank side is facing forward. The instructor can observe the ripple effect of understanding or non-understanding and quickly act appropriately. A survey study comparing the method to lecture only at two universities suggests that using it in combination with a lecture setting is superior to lecture only.